Title: Kerberos: The Definitive Guide: The Definitive Guide, Author: Jason Garman
Title: Starting with Security: An Introduction to Cyber Defense, Author: Charles Mukiibi
Title: Broadband Network and Device Security, Author: Benjamin M Lail
Title: Scrambling Techniques for Digital Transmission, Author: Byeong G. Lee
Title: Practical Intranet Security: Overview of the State of the Art and Available Technologies, Author: Paul M. Ashley
Title: Honeypots for Windows, Author: Roger A. Grimes
Title: Financial Cryptography: 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers, Author: Rebecca N. Wright
Title: Digital Contagions: A Media Archaeology of Computer Viruses, Second Edition, Author: Jussi Parikka
Title: SEMPER - Secure Electronic Marketplace for Europe / Edition 1, Author: Gerard Lacoste
Title: Wireless Operational Security, Author: John Rittinghouse PhD CISM
Title: Configuring Symantec AntiVirus Enterprise Edition, Author: Syngress
Title: Trusted Computing and Information Security: 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019, Revised Selected Papers, Author: Weili Han
Title: Ethical Hacking and Countermeasures: Threats and Defense Mechanisms / Edition 1, Author: EC-Council
Title: Cloud Native Security, Author: Chris Binnie
Title: Modeling Trust Context in Networks, Author: Sibel Adali
Title: Computer Forensics Infosec Pro Guide / Edition 1, Author: David Cowen
Title: Malware Detection / Edition 1, Author: Mihai Christodorescu
Title: Cisco Access Lists Field Guide, Author: Gilbert Held
Title: Android Malware Detection using Machine Learning: Data-Driven Fingerprinting and Threat Intelligence, Author: ElMouatez Billah Karbab
Title: IT Auditing Using Controls to Protect Information Assets, Third Edition, Author: Mike Kegerreis

Pagination Links